Software Requirement Analysis and Specification
Software Requirement Analysis and Specification
Software Requirement Analysis and Specification
System Construction
Key Management
Secure Node-to-Node Keys
Storage
Communication Security
MODULES DESCSRIPTION
System Construction
In the first module, we develop the System Construction module with Source, Router and
Destination entities. The topology is the arrangement of nodes in the simulation area. The routers
are connected in MANET topology. In which each routers are connected to each other via other
routers (Path). In our simulation, we are using multi-nodes as the router node and nodes as the
client-server node. Totally we are having multi-nodes in our network. Each host is connected via
routers. Each host has multiple paths to reach a single destination node in the network. The nodes
are connected by duplex link connection. The bandwidth for each link is 100 mbps and delay
time for each link is 10 ms. each edges uses Drop Tail Queue as the interface between the nodes.
Key Management
In this module, we develop the Key management. Packet Type denotes the function of the
packet. Timestamps provide uniqueness, allowing detection of replayedpackets and providing a
basis for non-repudiation ofpreviously sent packets.
SUPERMAN relies on the dynamic generation of keys toprovide secure communication.The
Diffie-Hellman key-exchange algorithm provides ameans of generating symmetric keys
dynamically and isused to generate the SK keys. SKb keys can simply be generatedby means of
random number generation or anequivalent secure key generation service.
Storage
SUPERMAN stores keys in each node’s security table. Thesecurity table contains the security
credentials of nodeswith which the node has previously directly communicated. This table has n
entries, wheren is the number of nodes that the node in question has directlycommunicated with.
Table has exchanged credentialswith two other nodes, X and Y.The shared symmetric broadcast
key (SKb) has two derivedforms, the SKbe and SKbp. These are stored in the localsecurity table
as a separate broadcast address.
Communication Security
Once a node has joined the network, it may engage in securecommunication with other nodes.
Secure communicationunder SUPERMAN provides two types of security;end-to-end and point-
to-point.End-to-end security provides security services betweensource and destination nodes by
using their shared SKe.Confidentiality and integrity are provided using an
appropriatecryptographic algorithm, which is used to generatean encrypted payload (EP).When
protected, data is propagated over multiple hops, itis authenticated at each hop. This is achieved
using a hashingalgorithm, such as HMAC. This is applied to the entirepacket to provide point-to-
point integrity.
2.3 Hardware Requirements
Processor : Core2duo
RAM : 1GB
Non-functional requirements describe user-visible aspects of the system that are not directly
related to functionality of the system. Non-functional requirements these are constraints on the
services or functions offered by the System.
Non-functional requirements are often called qualities of a system. Other terms for non-
functional requirements are "constraints", "quality attributes", "quality goals", "quality of service
requirements" and "non-behavioral requirements". Qualities, that are non-functional
requirements, can be divided into two main categories:
1. Execution qualities, such as security and usability, which are observable at run time.
2. Evolution qualities, such as testability, maintainability, extensibility and scalability,
which are embodied in the static structure of the software system.
Non-functional requirements
Product
Organizational External
requirements
requirement requirement
Legislative
Usability Delivery Implementation
Standards requirement
requirement requirement requirement
requirement
Privacy
Safety
requirement
Performance Space requirement
requirement requirement
Reliability
The packages will pick-up current transactions online. Regarding the old transactions, user will
enter them in to the system.
Security
The web server and database server should be protected from hacking, virus etc.
Portability
The application will be developed using standard open source software (Except Oracle) like
Java, tomcat web server, Internet Explorer Browser etc. these software will work both on
Windows and Linux OS. Hence portability problems will not arise.
Maintainability
The first tier is the GUI, which is said to be front-end and the second tier is the database, which
uses My-Sql, which is the back-end. The front-end can be run on different systems (clients).
The database will be running at the server. Users access these forms by using the user-ids and the
passwords.
Robustness
Time to restart after failure percentage of events causing failure probability of data corruption on
failure
Usability
The system is used by the four persons namely Administrator, Project Manager, Developer and
the customer. Each person is having their own roles and separated by the security issues.
Performance
System is highly functional and good in performance. The system must use the minimal set of
variables and minimal usage of the control structures will dynamically increase the performance
of the system.
Availability
The system is implemented based on the web browser and server. Using this web browser the
user can access the data and store the data in the server, here we can use the web browser as
Mozilla and server as Tomcat5.5. And windows XP professional is used as the platform.
Supportability
The system is designed to be the cross platform supportable. The System is supported on a wide
range of hardware and any software platform
Testability
The system software can be tested. Operability is the better it works, the more efficiency it can
be tested. It operates clearly. Observability is what you see is what you test. The results of each
test case are readily observer.
Accessibility
It is a general term used to describe the degree to which a product, device, service, or
environment is available to as many people as possible. Accessibility can be viewed as the
"ability to access" and benefit from some system or entity. Accessibility is often used to focus on
people with disabilities or special needs and their right of access to entities, often through use of
assistive technology .
Accessibility is not to be confused with usability which is used to describe the extent to which a
product (e.g., device, service, and environment) can be used by specified users to achieve
specified goals with effectiveness, efficiency and satisfaction in a specified context of use.
Scalability
Scalability is the ability of a system, network, or process, to handle growing amount of work in a
capable manner or its ability to be enlarged to accommodate that growth. For example, it can
refer to the capability of a system to increase total throughput under an increased load when
resources (typically hardware) are added. An analogous meaning is implied when the word is
used in a commercial context, where scalability of a company implies that the underlying
business model offers the potential for economic growth within the company.
Scalability, as a property of systems, is generally difficult to define and in any particular case it
is necessary to define the specific requirements for scalability on those dimensions that are
deemed important. It is a highly significant issue in electronics systems, databases, routers, and
networking.